lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BFECJLFBIFPLBMGJOIMKKEGEEFAA.rabbit@wnonline.net>
From: rabbit at wnonline.net (Adam)
Subject: Does the Windows AUX bug affect Web servers also?

I tested this on our only Win2K SP4 machine and the first time I entered the
url  http://www.somebody.com/aux ( where somebody was changed to one of our
sites ) I was pinging the server. The pings locked up and had 85% packet
loss. I then checked the site and it came up and the pinging started working
again. The server didn't crash but paused for a second. Unable to duplicate
the previous results.  The link had no affect on the server a second time.

Adam Richards
Network Administrator
WorldNet Communications, Inc.
318-213-9827 / Fax 318-213-8534
World Class Technology, Hometown Service


-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com]On Behalf Of Richard M.
Smith
Sent: Wednesday, July 09, 2003 11:50 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Does the Windows AUX bug affect Web servers
also?


Is it possible to also crash a Web server hosted on a Windows box using
a URL something like:

    http://www.somebody.com/aux

If this particular URL is okay, maybe there are other URLs that will
cause a crash.  For example, POSTing a form to a URL containing AUX.

This problem could be in any Windows Web server such as IIS, Apache,
ColdFusion, etc..

(I don't have access to a Windows Web server to try this out myself.)

Richard

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
xc3ed@...eaker.net
Sent: Wednesday, July 09, 2003 7:39 AM
To: full-disclosure@...ts.netsys.com
Cc: KF
Subject: Re: [Full-Disclosure] Internet Explorer 6 DoS Bug


duplicated in Windows 2003 Server, datacenter edition, IE v6.0.3790.0

regards, xsr

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ